CN113079011B - Method for pushing key, method for operating file, storage medium and computer device - Google Patents

Method for pushing key, method for operating file, storage medium and computer device Download PDF

Info

Publication number
CN113079011B
CN113079011B CN202110291158.9A CN202110291158A CN113079011B CN 113079011 B CN113079011 B CN 113079011B CN 202110291158 A CN202110291158 A CN 202110291158A CN 113079011 B CN113079011 B CN 113079011B
Authority
CN
China
Prior art keywords
encryption
environment
key
file
operated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110291158.9A
Other languages
Chinese (zh)
Other versions
CN113079011A (en
Inventor
王震
申悦
范忠文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changxin Memory Technologies Inc
Original Assignee
Changxin Memory Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changxin Memory Technologies Inc filed Critical Changxin Memory Technologies Inc
Priority to CN202110291158.9A priority Critical patent/CN113079011B/en
Publication of CN113079011A publication Critical patent/CN113079011A/en
Priority to PCT/CN2021/114114 priority patent/WO2022193547A1/en
Priority to US17/807,123 priority patent/US20220311601A1/en
Application granted granted Critical
Publication of CN113079011B publication Critical patent/CN113079011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Abstract

The invention provides a key pushing method, a file operating method, a computer readable storage medium and a computer device. The key pushing method comprises the following steps: setting a plurality of keys, wherein each key corresponds to different encryption environments; configuring an environment switching interface for selecting an encryption environment for a user terminal; and pushing the corresponding key to the user terminal according to the received key acquisition request. The method for operating the file comprises the following steps: acquiring a file operation instruction and a file to be operated; detecting a current encryption environment based on the file operation instruction; acquiring a key matched with the current encryption environment; and operating the file to be operated by adopting the matched secret key. By the technical scheme, the encryption environment is configured and distributed differently, so that the random distribution of the secret key is prevented, and the generation that the low-security-level encrypted file is mistakenly encrypted into the high security level due to the operation of the high-security-level file can be avoided.

Description

Method for pushing key, method for operating file, storage medium and computer device
Technical Field
The present invention relates to the field of computer software, and in particular, to a method for pushing a key, a method for operating a file, a computer readable storage medium, and a computer device.
Background
The encryption software in the prior art adopts a secret key to carry out stand-alone encryption on data on a computer terminal. For the case where the secret protection requirement is high, there is a case where when a file is operated using a high-level key, a low-level key file is erroneously opened, and thus a file encrypted by the low-level key is erroneously encrypted into a high-level encrypted file. This will result in a large number of users passively installing high-level keys for reading, thereby slowly transitioning the multi-key environment in the network to a single-key environment. Therefore, how to distinguish the confidentiality level and the key used for encryption from the data source, so as to avoid that the low-confidentiality-level encrypted file is mistakenly encrypted into high confidentiality level due to the operation of the high-confidentiality-level file, is a problem to be solved in the prior art.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a key pushing method, a file operating method, a computer readable storage medium and computer equipment, which can avoid that a low-security encrypted file is mistakenly encrypted into a high-security file due to the operation of the high-security file.
In order to solve the above problems, the present invention provides a method for pushing a key, including the following steps: setting a plurality of keys, wherein each key corresponds to different encryption environments; configuring an environment switching interface for selecting an encryption environment for a user terminal; and pushing the corresponding key to the user terminal according to the received key acquisition request.
Optionally, in the environment switching interface, different encryption environments are distinguished by keys with different colors.
Optionally, the rights of the corresponding encryption environment are configured for different user terminals.
Optionally, pushing the corresponding key to the user terminal according to the received key acquisition request includes: determining a target encryption environment according to the received key acquisition request; checking authority information of the user terminal; when the authority information accords with the authority of the target encryption environment, searching a key corresponding to the target encryption environment, and pushing the key to the user terminal; and when the authority information does not accord with the authority of the target encryption environment, searching a key corresponding to the authority information, and pushing the key to the user terminal.
In order to solve the above problems, the present invention provides a method for operating a file, including the steps of: acquiring a file operation instruction and a file to be operated; detecting a current encryption environment based on the file operation instruction; acquiring a key matched with the current encryption environment; and operating the file to be operated by adopting the matched secret key.
Optionally, the operation is selected from any one of encryption, decryption, and activation.
Optionally, the current encryption environment is a first encryption environment, the file encryption instruction specifies a second encryption mode corresponding to a second encryption environment, and the method further includes: providing an environment switching interface for selecting an encryption environment; when a trigger instruction for the environment switching interface is detected, switching the current encryption environment into a second encryption environment; the step of obtaining the key matched with the current encryption environment and operating the file to be operated according to the matched key comprises the following steps: and acquiring a second key matched with the second encryption environment, and operating the file to be operated according to the second key.
Optionally, before switching the current encryption environment to the second encryption environment, the method further includes: detecting the encryption state of the file to be operated; when the file to be operated is operated through a first encryption mode corresponding to a first encryption environment, a first key matched with the first encryption environment is obtained, and the file to be operated is operated through the first key.
Optionally, the method further comprises: and displaying the encryption state of the file to be operated through the encryption file icon and the identifier. The identifier is that a lock icon is added on the file icon to be operated so as to judge whether the file is an encrypted file or not by the lock icon, and different encryption modes are distinguished by colors. On the interface of the operation file, different encryption environments are distinguished by keys with different colors, and the colors of the keys are matched with the colors of the lock icons.
In order to solve the above-mentioned problems, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of any of the methods described above.
In order to solve the above problems, the present invention provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of any one of the methods described above when executing the program.
By the technical scheme, the encryption environment is configured and distributed differently, so that the random distribution of the secret key is prevented, and the generation that the low-security-level encrypted file is mistakenly encrypted into the high security level due to the operation of the high-security-level file can be avoided.
Drawings
FIG. 1 is a schematic diagram of the steps of a method according to an embodiment of the invention;
FIG. 2A is a schematic diagram of a security configuration of an encryption environment according to an embodiment of the present invention;
FIG. 2B is a schematic diagram of an encrypted file according to an embodiment of the present invention;
FIG. 2C is a schematic diagram of a selection interface of the user terminal according to an embodiment of the present invention;
FIG. 3 is a schematic diagram showing the steps of carrying out the method according to one embodiment of the present invention;
FIG. 4 is a schematic diagram showing the steps of carrying out the method according to one embodiment of the present invention;
fig. 5 is a schematic diagram showing the steps of the method according to an embodiment of the present invention.
Detailed Description
Embodiments of a method of key pushing, a method of operating a file, a computer-readable storage medium, and a computer device provided by the present invention are described in detail below with reference to the accompanying drawings.
An embodiment of a method for encrypting a file according to the present invention is first described with reference to the accompanying drawings, and fig. 1 is a schematic diagram illustrating steps of implementing the method according to the embodiment, where the method includes: step S10, setting a plurality of keys, wherein each key corresponds to different encryption environments; step S11, configuring an environment switching interface for selecting an encryption environment for a user terminal; and step S12, pushing the corresponding key to the user terminal according to the received key acquisition request.
The method is the steps to be implemented by the server side in the encryption operation process. Specifically, referring to step S10, a plurality of keys are set, each corresponding to a different encryption environment. A plurality of encryption environments and corresponding keys are set on a server. The encryption environments may be of different security levels. The plurality of encryption environments may include, for example, a plurality of encryption environments such as a general office environment, a research and development environment, a financial environment, a purchasing environment, and the like, and may also have a hierarchical relationship between different environments. Fig. 2A illustrates a security configuration of an encryption environment in an embodiment of the present invention, where the security of a general office environment is the lowest, and the density of a research and development environment, a financial environment, a purchasing environment, etc. is higher and independent of each other. And configuring keys for each encryption environment according to the configuration mode, wherein the keys comprise a general office key, a research and development key, a financial key and a purchasing key. Wherein the use department of the general office key is a staff member, and the staff member can have the office key and encrypt all the general office files by using the key. And staff in the research and development department encrypts research and development files by using the research and development key and encrypts common office class files by using the office key. The files encrypted by the office key can be circulated in all departments (decryption is not needed), and the files encrypted by the research and development key can only be circulated in research and development production departments, because only the departments have the key. Other departments may be similarly configured.
Referring to step S11, an environment switching interface for selecting an encryption environment is configured for the user terminal. The encryption environment is the encryption environment specified in the previous step, and the encryption state of the file to be operated is displayed through the encryption file icon and the identifier. The identifier may be that a lock icon is added to the file icon to be operated as shown in fig. 2B, so as to determine whether the file is encrypted or not by having the lock icon, and determine different encryption modes by using colors. The key used for encryption is one of the keys defined in step S10. The type of key uniquely corresponds to the encryption environment.
The encryption environment may include, for example, a plurality of encryption environments such as a general office environment, a research and development environment, a financial environment, a purchasing environment, and the like. In one embodiment of the present invention, as shown in fig. 2C, keys with different colors and/or text may be provided on the selection interface of the user terminal to distinguish different encryption environments and perform environment switching. The color of the key is the same as that of the lock icon so as to avoid misoperation. For example, as shown in fig. 2C, keys with different colors are disposed above the computer screen, and correspond to four encryption environments respectively. In other embodiments, the mobile phone screen or other terminal display device for reading the encrypted file may be used; the keys with different colors can be replaced by keys with different shapes or different encryption environments can be switched by sliding or rolling wheels. In this step, the encryption environment within the authority range of the user terminal may be configured for different user terminals. For example, for a developer's computer, only two selection keys for a general office environment and a development environment are configured, and no selection keys for other encryption environments, such as a financial environment, are configured. Therefore, the research personnel can be ensured not to acquire other irrelevant keys, and the keys are prevented from being randomly issued.
Referring to step S12, according to the received key obtaining request, the corresponding key is pushed to the user terminal. The received key acquisition request is a key acquisition request sent by the user terminal based on the environment switching interface, and the key acquisition request corresponds to a target encryption environment. After the user terminal confirms the encryption environment, if the user has the action of opening the file, the corresponding key is pushed to the user. Before pushing the key, the preferred step is to configure the rights of the corresponding encryption environment for different user terminals. The method specifically comprises the following steps: checking authority information of the user terminal; when the authority information accords with the authority of the target encryption environment, searching a key corresponding to the target encryption environment, and pushing the key to the user terminal; and when the authority information does not accord with the authority of the target encryption environment, searching a key corresponding to the authority information, and pushing the key to the user terminal. The above operation can ensure that if the user terminal does not obtain the authority of the key, the key is not pushed to the user terminal so as to avoid misoperation of the user. For example, if a research and development personnel clicks the financial environment by misoperation, but in fact, the computer does not have the authority of reading the financial file, the financial key is not pushed to the computer, so that the random distribution of the key is further ensured.
The preferred setting mode in the above step S11 is to configure the encryption environment within the authority range for different user terminals; and step S12, the preferred setting mode, namely authentication is carried out on the user terminal before the key is pushed, and at least one implementation of the two modes is carried out, so that the key can be ensured not to be issued randomly.
An embodiment of a method for operating a file according to the present invention is described below with reference to the accompanying drawings, and the operation of this embodiment is an encryption operation. Fig. 3 is a schematic diagram showing the implementation steps of the method according to the above embodiment, including: step S30, a file encryption instruction and a file to be encrypted are obtained; step S31, detecting the current encryption environment based on the file encryption instruction; step S32, obtaining a key matched with the current encryption environment; and step S33, encrypting the file to be encrypted according to the matched secret key.
The method is the steps to be implemented by the user side in the encryption operation process. Specifically, referring to step S30, a file encryption instruction and a file to be encrypted are acquired. The file to be encrypted may be any kind of data file stored in a computer.
Step S31, detecting the current encryption environment based on the file encryption instruction. In one embodiment of the present invention, the encryption environment may include, for example, a plurality of encryption environments such as a general office environment, a research and development environment, a financial environment, a purchasing environment, and the like, and the different environments may also have a hierarchical relationship therebetween. Fig. 2A illustrates a security configuration of an encryption environment in an embodiment of the present invention, where the security of a general office environment is the lowest, and the density of a research and development environment, a financial environment, a purchasing environment, etc. is higher and independent of each other.
And step S32, acquiring a key matched with the current encryption environment. According to the above configuration, each encryption environment is configured with a corresponding key, including a general office key, a development key, a financial key, and a purchase key. Wherein the use department of the general office key is a staff member, and the staff member has the office key and encrypts all the general office class files by using the key. And staff in the research and development department encrypts research and development files by using the research and development key and encrypts common office class files by using the office key. The files encrypted by the office key can be circulated in all departments (decryption is not needed), and the files encrypted by the research and development key can only be circulated in research and development production departments, because only the departments have the key. Other departments may be similarly configured. The identifier may be that a lock icon is added to the file icon to be operated as shown in fig. 2B, so as to determine whether the file is encrypted or not by having the lock icon, and determine different encryption modes by using colors. The key used for encryption is one of the keys defined in this step. The type of key uniquely corresponds to the encryption environment.
In one embodiment, if the current encryption environment is a first encryption environment, the file encryption instruction specifies a second encryption mode corresponding to a second encryption environment, and the method specifically includes: providing an environment switching interface for selecting an encryption environment; when a trigger instruction for the environment switching interface is detected, switching the current encryption environment into a second encryption environment; the obtaining the key matched with the current encryption environment, and encrypting the file to be encrypted according to the matched key comprises the following steps: and obtaining a second key matched with the second encryption environment, and encrypting the file to be encrypted according to the second key. The encryption environment and the identifier are the encryption environment and the identifier specified in the above step S30. In one embodiment of the present invention, as shown in fig. 2C, keys with different colors and/or text are provided on the selection interface of the user terminal to distinguish different encryption environments. The color of the key is the same as that of the lock icon so as to avoid misoperation. For example, as shown in fig. 2C, keys with different colors are disposed above the computer screen, and correspond to four encryption environments respectively. In other embodiments, the mobile phone screen or other terminal display device for reading the encrypted file may be used; the keys with different colors can be replaced by keys with different shapes or different encryption environments can be switched by sliding or rolling wheels.
In this step, before the current encryption environment is switched to the second encryption environment, the encryption state of the file to be operated may be detected; when the file to be operated is operated through a first encryption mode corresponding to a first encryption environment, a first key matched with the first encryption environment is obtained, and the file to be operated is operated through the first key. For example, only the development key is used to operate on files encrypted in a development environment. This prevents the keys from being issued at will.
In this step, the encryption environment within the authority range of the user terminal may be configured for different user terminals. For example, for a developer's computer, only two selection keys for a general office environment and a development environment are configured, and no selection keys for other encryption environments, such as a financial environment, are configured. Therefore, the research and development personnel can be ensured not to select other irrelevant keys such as finance and the like, and the random distribution of the keys is prevented.
Referring to step S32, a corresponding key is requested to open an encrypted file according to the selected encryption environment. After the encryption environment is selected, the corresponding secret key is requested to be issued to the server when the file is opened. Before pushing the key, the preferred step is to initiate authentication first, if the user terminal does not obtain the right of the key, the key cannot be requested, so as to avoid misoperation of the user. For example, if a developer clicks on the financial environment by mistake, but in fact the computer does not have the right to read the financial document, the key cannot be obtained, so as to further ensure that the key is not issued at will.
The preferred setting manner in the above step S31 is to configure the encryption environments within the authority range for different user terminals; and the preferred setting mode in step S32, that is, authentication is performed on the user terminal before pushing the key, and at least one implementation of the two modes is selected, so that the key can be ensured not to be issued randomly.
An embodiment of a method for operating a file according to the present invention is described below with reference to the accompanying drawings, and the operation of this embodiment is a decryption operation. Fig. 4 is a schematic diagram showing the implementation steps of the method according to the above embodiment, including: step S40, obtaining a file decryption instruction and a file to be decrypted; step S41, detecting the current encryption environment based on the file decryption instruction; step S42, obtaining a key matched with the current encryption environment; and step S43, decrypting the file to be decrypted according to the matched secret key.
The method is the steps to be implemented by the user side in the decryption operation process. Specifically, referring to step S40, a file decryption instruction and a file to be decrypted are acquired. The file to be decrypted may be any kind of data file stored in a computer.
Step S41, detecting the current encryption environment based on the file decryption instruction. In one embodiment of the present invention, the encryption environment may include, for example, a plurality of encryption environments such as a general office environment, a research and development environment, a financial environment, a purchasing environment, and the like, and the different environments may also have a hierarchical relationship therebetween. Fig. 2A illustrates a security configuration of an encryption environment in an embodiment of the present invention, where the security of a general office environment is the lowest, and the density of a research and development environment, a financial environment, a purchasing environment, etc. is higher and independent of each other.
Step S42, obtaining a key matched with the current encryption environment. According to the above configuration, each encryption environment is configured with a corresponding key, including a general office key, a development key, a financial key, and a purchase key. Wherein the use department of the general office key is a staff member, and the staff member has the office key and uses the key to decrypt all general office class files. And staff in the research and development production department decrypts the research and development file by using the research and development key and decrypts the common office class file by using the office key. Office keys can decrypt documents circulated in all departments, whereas research and development keys can only decrypt documents circulated in research and development production departments, since only these departments have this key. Other departments may be similarly configured. The identifier may be that a lock icon is added to the file icon to be decrypted as shown in fig. 2B, so as to determine whether the file is decrypted or not by having the lock icon, and determine different encryption modes by using colors. The key used for decryption is one of the keys defined in this step. The type of key uniquely corresponds to the encryption environment.
In one embodiment, if the current encryption environment is a first encryption environment, the file decryption instruction specifies a second encryption mode corresponding to a second encryption environment, and the method specifically includes: providing an environment switching interface for selecting an encryption environment; when a trigger instruction for the environment switching interface is detected, switching the current encryption environment into a second encryption environment; the obtaining the key matched with the current encryption environment, and decrypting the file to be decrypted according to the matched key comprises: and obtaining a second key matched with the second encryption environment, and decrypting the file to be decrypted according to the second key. The encryption environment and the identifier are the encryption environment and the identifier specified in the above step S40. In one embodiment of the present invention, as shown in fig. 2C, keys with different colors and/or text are provided on the selection interface of the user terminal to distinguish different encryption environments. The color of the key is the same as that of the lock icon so as to avoid misoperation. For example, as shown in fig. 2C, keys with different colors are disposed above the computer screen, and correspond to four encryption environments respectively. In other embodiments, the device may be a mobile phone screen or other terminal display device for reading the decrypted file; the keys with different colors can be replaced by keys with different shapes or different encryption environments can be switched by sliding or rolling wheels.
In this step, before the current encryption environment is switched to the second encryption environment, the decryption state of the file to be operated may be detected; when the file to be operated is operated through a first encryption mode corresponding to a first encryption environment, a first key matched with the first encryption environment is obtained, and the file to be operated is operated through the first key. For example, only the development key is used to operate on files that have been decrypted in the development environment. This prevents the keys from being issued at will.
In this step, the encryption environment within the authority range of the user terminal may be configured for different user terminals. For example, for a developer's computer, only two selection keys for a general office environment and a development environment are configured, and no selection keys for other encryption environments, such as a financial environment, are configured. Therefore, the research and development personnel can be ensured not to select other irrelevant keys such as finance and the like, and the random distribution of the keys is prevented.
Referring to step S43, the file to be decrypted is decrypted according to the matched key. After the encryption environment is selected, the corresponding secret key is requested to be issued to the server when the file is opened. Before pushing the key, the preferred step is to initiate authentication first, if the user terminal does not obtain the right of the key, the key cannot be requested, so as to avoid misoperation of the user. For example, if a developer clicks on the financial environment by mistake, but in fact the computer does not have the right to read the financial document, the key cannot be obtained, so as to further ensure that the key is not issued at will.
The preferred setting manner in the above step S41 is to configure the encryption environments within the authority range for different user terminals; and step S42, the preferred setting mode, namely, the authentication is carried out on the user terminal before the key is pushed, at least one implementation of the two modes is selected, and the key can be ensured not to be issued randomly.
An embodiment of a method for operating a file according to the present invention is described below with reference to the accompanying drawings, where the operation of the embodiment is an opening operation. Fig. 5 is a schematic diagram showing the implementation steps of the method according to the above embodiment, including: step S50, acquiring a file opening instruction and a file to be opened; step S51, detecting the current encryption environment based on the file opening instruction; step S52, obtaining a key matched with the current encryption environment; and step S53, opening the file to be opened according to the matched secret key.
The method is the steps to be implemented by the user side in the starting operation process. Specifically, referring to step S50, a file opening instruction and a file to be opened are obtained. The file to be opened can be any data file stored in a computer.
Step S51, detecting the current encryption environment based on the file opening instruction. In one embodiment of the present invention, the encryption environment may include, for example, a plurality of encryption environments such as a general office environment, a research and development environment, a financial environment, a purchasing environment, and the like, and the different environments may also have a hierarchical relationship therebetween. Fig. 2A illustrates a security configuration of an encryption environment in an embodiment of the present invention, where the security of a general office environment is the lowest, and the density of a research and development environment, a financial environment, a purchasing environment, etc. is higher and independent of each other.
In one embodiment, when the current encryption environment is the second encryption environment and an opened file encrypted by a first encryption mode corresponding to the first encryption environment or an unencrypted opened file is detected, the opened file is prompted to be closed.
Step S52, obtaining a key matched with the current encryption environment. According to the above configuration, each encryption environment is configured with a corresponding key, including a general office key, a development key, a financial key, and a purchase key. The general office key using department is staff, and staff has the office key and uses the key to open all general office files. And staff in the research and development production department opens research and development files by using the research and development key and common office files by using the office key. Office keys can open files that circulate in all departments, while research and development keys can only open files that circulate in research and development production departments, since only these departments have this key. Other departments may be similarly configured. The identifier may be that a lock icon is added to the to-be-opened file icon as shown in fig. 2B, so as to determine whether the to-be-opened file is an encrypted file or not by having the lock icon, and determine different encryption modes by using colors. The key used for opening is one of the keys defined in the step. The type of key uniquely corresponds to the encryption environment.
In one embodiment, if the current encryption environment is a first encryption environment, the file open instruction specifies a second encryption mode corresponding to a second encryption environment, and the method specifically includes: providing an environment switching interface for selecting an encryption environment; when a trigger instruction for the environment switching interface is detected, switching the current encryption environment into a second encryption environment; the obtaining the key matched with the current encryption environment, and the opening the file to be opened according to the matched key comprises the following steps: and acquiring a second key matched with the second encryption environment, and opening the file to be opened according to the second key. The encryption environment and the identifier are the encryption environment and the identifier specified in the above step S50. In one embodiment of the present invention, as shown in fig. 2C, keys with different colors and/or text are provided on the selection interface of the user terminal to distinguish different encryption environments. The color of the key is the same as that of the lock icon so as to avoid misoperation. For example, as shown in fig. 2C, keys with different colors are disposed above the computer screen, and correspond to four encryption environments respectively. In other embodiments, the mobile phone screen or other terminal display device for reading the encrypted file may be used; the keys with different colors can be replaced by keys with different shapes or different encryption environments can be switched by sliding or rolling wheels.
In this step, before the current encryption environment is switched to the second encryption environment, the open state of the file to be operated may be detected; when the file to be operated is operated through a first encryption mode corresponding to a first encryption environment, a first key matched with the first encryption environment is obtained, and the file to be operated is operated through the first key. For example, only the development key is used to operate on files that have been opened in the development environment. This prevents the keys from being issued at will.
In this step, the encryption environment within the authority range of the user terminal may be configured for different user terminals. For example, for a developer's computer, only two selection keys for a general office environment and a development environment are configured, and no selection keys for other encryption environments, such as a financial environment, are configured. Therefore, the research and development personnel can be ensured not to select other irrelevant keys such as finance and the like, and the random distribution of the keys is prevented.
Referring to step S53, the file to be opened is opened according to the matched key. After the encryption environment is selected, the corresponding secret key is requested to be issued to the server when the file is opened. Before pushing the key, the preferred step is to initiate authentication first, if the user terminal does not obtain the right of the key, the key cannot be requested, so as to avoid misoperation of the user. For example, if a developer clicks on the financial environment by mistake, but in fact the computer does not have the right to read the financial document, the key cannot be obtained, so as to further ensure that the key is not issued at will.
The preferred setting manner in the above step S51 is to configure the encryption environments within the authority range for different user terminals; and step S52, the preferred setting mode, namely, the authentication is carried out on the user terminal before the key is pushed, at least one implementation of the two modes is selected, and the key can be ensured not to be issued randomly.
The above explanation is made with respect to three specific operation scenarios of encryption, decryption, and opening. It should be noted that in other embodiments, any other file operation, such as copying, deleting, and modifying a file name, may be limited, so as to ensure that it may only be performed in a specified encryption environment, so as to ensure security and reliability of the security environment.
The encrypted file used in the above embodiments is shown by an encrypted file icon and an identifier, where the identifier is used to indicate an encryption mode of the encrypted file, and the encrypted file is encrypted under an encryption environment corresponding to the encryption mode by a key corresponding to the encryption mode. As one embodiment, the identifier is that a lock icon is attached to the encrypted file icon, so that whether the encrypted file is distinguished by whether the lock icon is provided or not, and different encryption modes are distinguished by colors.
The method according to any of the above embodiments may be configured in a computer readable storage medium, on which a computer program is stored, which program, when being executed by a processor, implements the steps of the method according to any of the above embodiments.
The method according to the above embodiments may be configured in a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method according to any of the above embodiments when the program is executed.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (10)

1. A method of key pushing, comprising the steps of:
setting a plurality of keys, wherein each key corresponds to different encryption environments;
configuring an environment switching interface for selecting an encryption environment for a user terminal, and configuring rights of the corresponding encryption environment for different user terminals;
determining a target encryption environment according to the received key acquisition request;
checking authority information of the user terminal;
when the authority information accords with the authority of the target encryption environment, searching a key corresponding to the target encryption environment, and pushing the key to the user terminal;
when the authority information does not accord with the authority of the target encryption environment, searching a key corresponding to the authority information, and pushing the key to the user terminal;
when a triggering instruction for the environment switching interface is detected, the current first encryption environment is switched to a second encryption environment, a second key matched with the second encryption environment is obtained, and the file to be operated is operated according to the second key.
2. The method of claim 1, wherein different encryption environments are distinguished by keys of different colors in the environment switching interface.
3. A method of operating a document, comprising the steps of:
acquiring a file operation instruction and a file to be operated;
detecting a current encryption environment based on the file operation instruction, wherein the current encryption environment is a first encryption environment, and the file operation instruction designates a second encryption mode corresponding to a second encryption environment;
providing an environment switching interface for selecting an encryption environment, and configuring rights of the corresponding encryption environment by different user terminals;
when a trigger instruction for the environment switching interface is detected, switching the current encryption environment into a second encryption environment;
and acquiring a second key matched with the second encryption environment, and operating the file to be operated according to the second key.
4. A method according to claim 3, wherein the operation is selected from any one of encryption, decryption, and activation.
5. A method according to claim 3, further comprising, prior to switching the current encryption environment to the second encryption environment:
detecting the encryption state of the file to be operated;
when the file to be operated is operated through a first encryption mode corresponding to a first encryption environment, a first key matched with the first encryption environment is obtained, and the file to be operated is operated through the first key.
6. A method according to claim 3, characterized in that the method further comprises:
and displaying the encryption state of the file to be operated through the encryption file icon and the identifier.
7. The method of claim 6, wherein the identifier is a lock icon attached to the file icon to be operated to distinguish whether the file is encrypted or not with the lock icon, and distinguish different encryption modes with colors.
8. The method of claim 7, wherein different encryption environments are distinguished by keys of different colors on the interface of the operation file, and the colors of the keys match the colors of the lock icons.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1-8.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1-8 when the computer program is executed by the processor.
CN202110291158.9A 2021-03-18 2021-03-18 Method for pushing key, method for operating file, storage medium and computer device Active CN113079011B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110291158.9A CN113079011B (en) 2021-03-18 2021-03-18 Method for pushing key, method for operating file, storage medium and computer device
PCT/CN2021/114114 WO2022193547A1 (en) 2021-03-18 2021-08-23 Key pushing method, file operation method, storage medium, and computer device
US17/807,123 US20220311601A1 (en) 2021-03-18 2022-06-15 Method for pushing key, method for operating file, storage medium, and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110291158.9A CN113079011B (en) 2021-03-18 2021-03-18 Method for pushing key, method for operating file, storage medium and computer device

Publications (2)

Publication Number Publication Date
CN113079011A CN113079011A (en) 2021-07-06
CN113079011B true CN113079011B (en) 2023-06-02

Family

ID=76612899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110291158.9A Active CN113079011B (en) 2021-03-18 2021-03-18 Method for pushing key, method for operating file, storage medium and computer device

Country Status (3)

Country Link
US (1) US20220311601A1 (en)
CN (1) CN113079011B (en)
WO (1) WO2022193547A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079011B (en) * 2021-03-18 2023-06-02 长鑫存储技术有限公司 Method for pushing key, method for operating file, storage medium and computer device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659632A (en) * 2017-09-19 2018-02-02 咪咕数字传媒有限公司 A kind of file encryption-decryption method, device and computer-readable recording medium

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8045714B2 (en) * 2005-02-07 2011-10-25 Microsoft Corporation Systems and methods for managing multiple keys for file encryption and decryption
US7747024B2 (en) * 2007-02-09 2010-06-29 Lenovo (Singapore) Pte. Ltd. System and method for generalized authentication
US8694507B2 (en) * 2011-11-02 2014-04-08 Microsoft Corporation Tenantization of search result ranking
CN104331661B (en) * 2014-11-21 2017-11-21 努比亚技术有限公司 Terminal encryption state switching method and system
US20160248809A1 (en) * 2015-02-20 2016-08-25 Intel Corporation Methods and apparatus to process data based on automatically detecting a security environment
CN106650482A (en) * 2015-11-04 2017-05-10 阿里巴巴集团控股有限公司 Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN106936787A (en) * 2015-12-31 2017-07-07 金雅拓股份有限公司 For protecting the method that encryption key is used in two different encryption environment
CN105912895A (en) * 2016-04-08 2016-08-31 上海卓易科技股份有限公司 Operation limiting method and system for intelligent terminal
CN107104797B (en) * 2017-05-03 2020-08-11 顾杏春 Office encryption method and device
CN108563959A (en) * 2018-04-24 2018-09-21 努比亚技术有限公司 File encrypting method, device and computer storage media
CN109740363B (en) * 2019-01-04 2023-03-14 贵州大学 Document grading desensitization encryption method
CN110502918A (en) * 2019-07-09 2019-11-26 杭州电子科技大学 A kind of electronic document access control method and system based on classification safety encryption
CN113079011B (en) * 2021-03-18 2023-06-02 长鑫存储技术有限公司 Method for pushing key, method for operating file, storage medium and computer device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659632A (en) * 2017-09-19 2018-02-02 咪咕数字传媒有限公司 A kind of file encryption-decryption method, device and computer-readable recording medium

Also Published As

Publication number Publication date
CN113079011A (en) 2021-07-06
US20220311601A1 (en) 2022-09-29
WO2022193547A1 (en) 2022-09-22

Similar Documents

Publication Publication Date Title
EP3451575B1 (en) Methods, systems and computer program product for providing encryption on a plurality of devices
US7808664B2 (en) Approach for securely printing electronic documents
US8031349B2 (en) Approach for securely printing electronic documents
US8031348B2 (en) Approach for securely printing electronic documents
US8918633B2 (en) Information processing device, information processing system, and program
CN101939754B (en) Finger sensing apparatus using hybrid matching and associated methods
US8489889B1 (en) Method and apparatus for restricting access to encrypted data
US11842348B2 (en) Data management system and data management method
EP2056517A2 (en) Encryption apparatus, decryption apparatus and cryptography system
US10970403B1 (en) Forensic investigation tool
JP5389401B2 (en) Encryption device, decryption device, and encryption system
CN112567441A (en) Information processing system, information processing method, and information processing apparatus
CN113079011B (en) Method for pushing key, method for operating file, storage medium and computer device
US20050038994A1 (en) Storing authentication sequences for expedited login to secure applications
KR20030029475A (en) Outside leakage preventing system of confidential information
JP4587688B2 (en) Encryption key management server, encryption key management program, encryption key acquisition terminal, encryption key acquisition program, encryption key management system, and encryption key management method
JP2007020065A (en) Decryption backup method, decryption restoration method, attestation device, individual key setting machine, user terminal, backup equipment, encryption backup program, decryption restoration program
JP2007188307A (en) Data file monitor apparatus
JP4813768B2 (en) Resource management apparatus, resource management program, and recording medium
JP2008287689A (en) Group encryption and decryption system and method, and program
JP5730488B2 (en) Information processing system
JP7159747B2 (en) Electronic file creation device, electronic data processing device, electronic data management system, electronic data management method, and program
Hokke et al. A self-compiling android data obfuscation tool
JP2016163198A (en) File management device, file management system, file management method, and file management program
CN114282244A (en) Multi-cloud key management and BYOK-based data security management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant